Changes between Version 2 and Version 3 of CookBookPasswordGreasemonkeyUserScript
- Timestamp:
- Apr 30, 2006, 11:13:30 AM (19 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
CookBookPasswordGreasemonkeyUserScript
v2 v3 1 1 Django admin expects users' passwords to be entered as SHA-1 hashes in the format {{{[algo]$[salt]$[hexdigest]}}}. Here is a tool which automates calculating the hashes on the client side. 2 3 What it does as of version 1.0 is: 4 * searches each opened page for an {{{<input>}}} with {{{id="id_password"}}}, {{{class="vTextField required"}}}, {{{name="password}}}, {{{size="30"}}} and {{{maxlength="128"}}}, which is how the password field is defined in Django admin 5 * when the password field loses focus, replaces its contents with a SHA-1 salted hash as Django expects 6 * does not modify field contents if it's already a hash 2 7 3 8 You need to 4 9 * use the Firefox browser 5 10 * install the [http://greasemonkey.mozdev.org/ Greasemonkey] extension 6 * install the [ wiki:CookBookDjangoPasswordHasherUserJs djangopasswordhasher.user.js] user script11 * install the [http://svn.ambitone.com/ambidjangolib/js/djangopasswordhasher.user.js djangopasswordhasher.user.js] user script 7 12 8 13 Pros: … … 12 17 Cons: 13 18 * needs the extension on the browser 19 * doesn't use a real password field -- password entry is visible 20 21 --- 22 23 ''Note:'' Don't try to install the script using the attachments below. Use the remote link above instead. Admins should remove the attachments.